Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Krishna Naik, K.
- Data Handover Technique for Multiband Transceiver
Abstract Views :111 |
PDF Views:0
Authors
Amit Naik
1,
K. Krishna Naik
1
Affiliations
1 Communication Laboratory, Electronics Engineering, Defence Institute of Advanced Technology (DIAT), Pune, IN
1 Communication Laboratory, Electronics Engineering, Defence Institute of Advanced Technology (DIAT), Pune, IN
Source
KHOJ: Journal of Indian Management Research and Practices, No 2016 Spl, Pagination: 132-136Abstract
In this paper, an effective technique of data handover amongst multiband transceivers is deliberated. Pictures send as the invisible watermark is not easily detectable. We have effectively embedded and extracted watermark image at source and receiver end. The Embedding algorithm of invisible watermarking is based on singular value decomposition. Numerous premeditated noise attacks are executed on the transmitted watermarked image to check the consequence of noise attack on the image. Watermarked image is recovered and checked on the basis of numerous quality checks parameters like peak signal to noise ratio. We are getting 30.8814 as PSNR value for 8 bit which is under reasonable and acceptable range.Keywords
Image, PSNR, Singular Value Decomposition, Watermarking.References
- Vidyasagar M. Potdar, Song Han and Elizabeth Chang. “A Survey of Digital Image Watermarking Techniques.” 1012 Aug 2005 3rd IEEE International Conference on Industrial Informatics (INDIN).pp 709-716.
- Yu Xin, Yan Ting. “A Practical Scheme of Defeating Interpretation Attack of Digital Waterm arking.” Image Analysis and Signal Processing, 2009. IASP 2009. International Conference o n. 11-12 April 2009.pp 91 – 93.
- Daniel Caragata, Safwan El Assad, Mauricio Luduena. “An improved fragile watermarking a lgorithm for JPEG images.” Int. J. Electron. Commun. (AEÜ) 69 (2015) 1783–1794.
- Razieh Keshavarzian, Ali Aghagolzadeh. “ROI based robust and secure image watermarking using DWT and Arnold map.”Int. J. Electron. Commun. (AEÜ) 70 (2016) 278–288.
- S. Voloshynovskiy, S. Pereira, T. Pun,J.J. Eggers and J.K. Su. “Attacks on Digital Watermarks: Classification, Estimation-based Attacks and Benchmarks.” Communications Magazine, IEEE (Volume: 39 , Issue: 8 ) pp: 118 – 126.
- Mr. Venugopal Reddy CH and Dr. Siddaiah. P. “Medical Image Watermarking Schemes again st Salt and Pepper Noise Attack.” International Journal of Bio-Science and BioTechnology V ol.7, No.6 (2015), pp.55-64
- Divya saxena. “Digital Watermarking Algorithm based on Singular Value Decomposition an d Arnold Transform.” International Journal of Electronics and Computer Science Engineering. ISSN- 2277-1956/V1N1-22-27
- Chih-Chin Lai. “A digital watermarking scheme based on singular value decomposition and t iny genetic algorithm.” Digital Signal Processing 21 (2011) 522–527.